Course: Information Security and Cryptology

« Back
Course title Information Security and Cryptology
Course code USII/EBIK
Organizational form of instruction Lecture + Tutorial
Level of course Master
Year of study 2
Semester Winter
Number of ECTS credits 5
Language of instruction English
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Čapek Jan, prof. Ing. CSc.
  • Hub Miloslav, doc. Ing. Ph.D.
Course content
Importance of information protection, security policy, risk analysis. Biometric authentication. Mathematical Foundations - Modular Arithmetic. Mathematical Foundations - Introduction to Number Theory, Circuits, Groups. Symmetric ciphers - methods, advantages and disadvantages of modern methods. Cryptanalysis. Asymmetric ciphers - methods, advantages and disadvantages of modern methods. Selected encryption techniques Vernam and Hill cipher, Selected RSA encryption techniques. El-Gamal, Diffie - Hellman. Selected encryption techniques DES, AES, etc Elliptic curves. Hash algorithms. Steganography.

Learning activities and teaching methods
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming)
  • Contact teaching - 52 hours per semester
  • Preparation for an exam - 50 hours per semester
  • Individual project - 20 hours per semester
  • Preparation for a credit (assessment) - 28 hours per semester
Learning outcomes
The aim of the course is to acquire advanced theoretical knowledge of information protection in their processing by means of computer technology and their transmissions by cryptology
A student who has successfully completed the course can: define basic concepts and know their use; describe information security objectives; mathematical fundamentals of cryptology; explain the principles of encryption techniques A student who has successfully completed the course know: Use encryption techniques; Select the appropriate encryption technique for the problem; Use encryption software; A student who has successfully completed the course is able to: Use encryption techniques; Select the appropriate encryption technique for the problem; Use encryption software;
Prerequisites
unspecified

Assessment methods and criteria
Oral examination, Written examination, Home assignment evaluation

Credit: is awarded based on the development and successful defense of assigned tasks within deadlines. Exam: written and oral, 65% is required to pass. The degree of knowledge and ability to apply acquired knowledge is examined. The condition is obtaining credit.
Recommended literature
  • FERGUSON,N., SCHNEIER, B.,TADAYOSIHI,K.. Cryptography Engineering: Design Principles and Practical Applications in Engineering Design. Wiley publishing, 2010. ISBN 978-0-470-47424-2.
  • SCHNEIER,B.. Applied cryptography, Protocols, Algoritthms, and Source Codxe in C. Wiley, 2015. ISBN 1119096723.
  • STALLINGS, W. Cryptography and network security : principles and practice. (7th Edition). Upper Saddle River: Pearson Education, 2016. ISBN 0134444284.
  • ZELENKA J., ČAPEK J., FRANCEK J., JANÁKOVÁ H. Ochrana dat. Kryptologie. Hradec Králové: Gaudeamus, 2003. ISBN 8070417374.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester